Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Windows Technology

Microsoft Says, Don't Press the F1 Key In XP 324

Ian Lamont writes "Microsoft has issued a security advisory warning users not to press the F1 key in Windows XP, owing to an unpatched bug in VBScript discovered by Polish researcher Maurycy Prodeus. The security advisory says that the vulnerability relates to the way VBScript interacts with Windows Help files when using Internet Explorer, and could be triggered by a user pressing the F1 key after visiting a malicious Web site using a specially crafted dialog box."
This discussion has been archived. No new comments can be posted.

Microsoft Says, Don't Press the F1 Key In XP

Comments Filter:
  • by 0WaitState ( 231806 ) on Tuesday March 02, 2010 @08:34PM (#31338672)
    How about we tax microsoft for their polluting the internet with their insecure-by-design OS installs? About $50 per install will put a dent in all the economic damage Windows causes.

    Don't press the F1 key? Jesus fucking christ. What next, don't power up the box?
  • by BitterOak ( 537666 ) on Tuesday March 02, 2010 @08:46PM (#31338800)
    The security advisory says the problem has to do with the way Internet Explorer interacts with the help system. Does anyone know if Firefox users are vulnerable?
  • by martin-boundary ( 547041 ) on Tuesday March 02, 2010 @08:53PM (#31338876)

    Angry or not angry, the point is that disclosing security bugs directly to the vendor first minimizes harm to end users

    It does not. It minimizes potential damage to the brand, so the vendor can decide if it's worth their while to do something.

    You can't argue that "security researchers" who sell 0-day vulnerabilities on the black market are helping anybody but themselves

    Better they sell it on the black market than they use it quietly. Moreover, if there's a market, then it's worth something and "good guys" can bid, too.

  • by Alien1024 ( 1742918 ) on Tuesday March 02, 2010 @08:58PM (#31338916)
    This probably affects any help file in html format, which is displayed through the IE rendering engine. Many new applications use html help files.
  • by ffreeloader ( 1105115 ) on Tuesday March 02, 2010 @09:15PM (#31339076) Journal

    First you say it really doesn't matter if Windows users know anything about how their system is set up and how things work, but then go on to explain how their ignorance about how things work is their greatest weakness. You pretty much defeat defeat your own argument without realizing it.

  • Damn! (Score:3, Interesting)

    by Korbeau ( 913903 ) on Tuesday March 02, 2010 @09:16PM (#31339086)

    I'll have to stop missing the ESC and ~ key!

    Most annoying thing: press F1 in a software like Visual Studio and have to wait 5 minutes for it to refresh online help.

  • by deniable ( 76198 ) on Tuesday March 02, 2010 @09:40PM (#31339284)
    Even funnier if that's a BIOS message. No, don't press F1 if you're in Windows, yes if it's starting up, no not in IE. Help-desks of the world, I feel your pain.
  • Microsoft Interview (Score:4, Interesting)

    by dawilcox ( 1409483 ) on Tuesday March 02, 2010 @10:03PM (#31339440)
    I interviewed with Microsoft for a development position a few weeks ago. I found that the interviewers were very arrogant. They assumed they knew all the details about my past projects. It felt like politics with them would be horrendous because everyone is showing each other up.

    Needless to say, I turned down the job offer. It doesn't surprise me how they keep making flub ups like this when the people at their company are so arrogant.

  • by RalphSleigh ( 899929 ) on Tuesday March 02, 2010 @10:08PM (#31339474) Homepage

    The same HTML rendering component I can understand, but in this case it appears a script running in a web browser instance of the component can somehow affect the help rendering instance, and that is a quality WTF.

  • Oops! (Score:2, Interesting)

    by nastro ( 32421 ) on Tuesday March 02, 2010 @10:24PM (#31339566)

    I hit F1 by accident at least once a day trying for the Esc key.

  • by kimvette ( 919543 ) on Tuesday March 02, 2010 @10:27PM (#31339586) Homepage Journal

    having drum brakes won't make it easier for people to steal your car, or cause it to suddenly stop working while you're driving

    I take it you have never had a "classic" car with drum brakes all around. I assure you that drum brakes can suddenly stop working; they are far more susceptible to fade than disc brakes with vented rotors, and if you don't know to ride the brakes a bit after driving through puddles if you have drum brakes (to boil off the nice layer of water that ends up being a great lubricant on the shoes) you can end up with NO braking "power." There is good reason a lot of owners of antique R^HMustangs upgrade to front disc brakes even for non-performance builds.

  • by dweller_below ( 136040 ) on Tuesday March 02, 2010 @11:26PM (#31340002)

    Angry or not angry, the point is that disclosing security bugs directly to the vendor first minimizes harm to end users - assuming, that is, the vendor feels sufficiently motivated to fix the bug.

    IN A TIMELY MANNER.

    You forgot the bit that's at the core of the disclosure debate. Virtually everybody in the security industry agrees on the principles of disclosure. All the flames are over the timing.

    In one corner, we have Microsoft. They appear to believe in full disclosure, once the disclosure will have no adverse effects on stock price or profitability.

    In another corner, we have a tiny handful of scum sucking, mercenary security researchers who believe that disclosure will happen just as soon as they get paid. And the terms of that disclosure will be whatever the purchaser wants.

    In the other corners, and carpeting the entire floor, are all the rest of the security community. They believe that full disclosure must happen in a time-frame that minimizes damage to the user community. They just can't agree on when that might be.

    This lack of a concensus has made it easy for Microsoft to define the current terms of disclosure. The result has been suppression of disclosure for longer and longer periods. The inevitable consequence is more and more '0' day exploits.

    In September 2009, SANS released an excellent State-of-the-Internet on the top cyber security threats: http://www.sans.org/top-cyber-security-risks/ [sans.org] One of their points was:

    "World-wide there has been a significant increase over the past three years in the number of people discovering zero-day vulnerabilities, as measured by multiple independent teams discovering the same vulnerabilities at different times. Some vulnerabilities have remained unpatched for as long as two years."

    To demonstrate this issue they enumerated the history of MS08-031:

    For example, MS08-031 (Microsoft Internet Explorer DOM Object Heap Overflow Vulnerability) was discovered independently by three researchers. The first researcher submitted remote IE 6/7 critical vulnerability on Oct 22, 2007. A second independent researcher submitted the same vulnerability on April 23, 2008. A third independent researcher submitted the same vulnerability on May 19, 2008. All three submissions outlined different approaches of auditing and finding the same vulnerability.

    What goes unstated is while 3 'responsible' researchers disclosed to Microsoft and waited and waited, unknown numbers of hackers also discovered the vulnerabilities and exploited them.

    Just this week, a dozen well managed, fully patched, WinXP (with .NET installed) computers at my institution were compromised by clicking on a major news site (http://www.ksl.com/index.php?nid=148&sid=9814436).

    Microsoft would have us believe that this is acceptable. But really, would immediate, full disclosure be any worse?

    Miles

  • by Anonymous Coward on Wednesday March 03, 2010 @12:03AM (#31340280)

    Umm, this patch would have you assume that the program HELPCTR.EXE is the culprit. Its not, its the way that HELPCTR.EXE is called that is the security problem. So, even before dummy.exe gets called, you already vunerable. bummer -Killmofasta

  • by markus o'farkus ( 98120 ) on Wednesday March 03, 2010 @12:21AM (#31340386)

    Whenever I had to admin a windows network, this is the one goddamn key I wish my users would have hit before picking up the phone.

    And now they won't because they don't want to get virus?

    I mean, I don't really care any more since I support Linux, but, shit man, I feel bad. That's just not right.

  • by gig ( 78408 ) on Wednesday March 03, 2010 @07:15AM (#31343192)

    If you are still using XP at this point, who cares? Go for it. Press F1 while running FlashPlayer and Acrobat and IE6 simultaneously. If you gave a shit or had any data worth protecting you'd already be using a Mac or other Unix.

  • by Anonymous Coward on Wednesday March 03, 2010 @10:06AM (#31344800)

    Interesting theory. Entirely wrong, of course, since IE actually started out as Spyglass Mosaic, which MS licensed, renamed, and started selling. (The agreement stated that Spyglass received royalties for every copy of IE that Microsoft sold, prompting MS to start giving it away free. Worked out for us, not so much for Spyglass.)

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...